2016 - Special Issue on "New Trends for Security in Network Analytics and Internet of Things" in IJ of Advanced Intelligence Paradigms (Scopus (Elsevier)), Due on Aug. 15
Topics/Call fo Papers
Special Issue on: "New Trends for Security in Network Analytics and Internet of Things"
Guest Editors:
Gulshan Shrivastava, Galgotias University, India
Prabhat Kumar, National Institute of Technology Patna, India
Manju Khari, Ambedkar Institute of Advanced Communication Technology and Research, India
The focal objective of this special issue is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and mechanisms; develop basic skills of secure network architecture; and explain the theory behind the security of wireless networks, antennas and different cryptographic algorithms. It also aims to provide a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, concerns and practical challenges encountered and the solutions adopted in these fields.
There is an imminent and increasing demand for Internet of Things (IoT). Leveraging this blooming technology, one can envisage a lot of changes in the internet world. Big data-based ICT penetration will create an ample number of job opportunities in the industrial sectors, especially for rural people. To describe common network vulnerabilities and attacks, defense mechanisms against network attacks and cryptographic protection mechanisms is also the need of hour. Exploration of the requirements of real-time communication security and issues related to the security of web services is essential. This all relates to the exploration and exposition of the technologies and tools for enabling the extraction of timely and actionable insights from IoT data.
Subject Coverage
Suitable topics include, but are not limited to:
Information security
Cyber security
Advanced encryption algorithms
Database security
Information security
Data privacy and security
Modern cryptography
Security models for the enhancement of data security
Secure converged and integrated systems for data analytics
Secure IoT data analytics and platforms
Role of R in data analysis
Web forensic computing
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
Important Dates
Submission of manuscripts: 15 August, 2016
Notification to authors: 15 October, 2016
Final versions due: 15 November, 2016
Guest Editors:
Gulshan Shrivastava, Galgotias University, India
Prabhat Kumar, National Institute of Technology Patna, India
Manju Khari, Ambedkar Institute of Advanced Communication Technology and Research, India
The focal objective of this special issue is to provide insight mechanisms while handling data; provide conceptual understanding of network security issues, challenges and mechanisms; develop basic skills of secure network architecture; and explain the theory behind the security of wireless networks, antennas and different cryptographic algorithms. It also aims to provide a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, concerns and practical challenges encountered and the solutions adopted in these fields.
There is an imminent and increasing demand for Internet of Things (IoT). Leveraging this blooming technology, one can envisage a lot of changes in the internet world. Big data-based ICT penetration will create an ample number of job opportunities in the industrial sectors, especially for rural people. To describe common network vulnerabilities and attacks, defense mechanisms against network attacks and cryptographic protection mechanisms is also the need of hour. Exploration of the requirements of real-time communication security and issues related to the security of web services is essential. This all relates to the exploration and exposition of the technologies and tools for enabling the extraction of timely and actionable insights from IoT data.
Subject Coverage
Suitable topics include, but are not limited to:
Information security
Cyber security
Advanced encryption algorithms
Database security
Information security
Data privacy and security
Modern cryptography
Security models for the enhancement of data security
Secure converged and integrated systems for data analytics
Secure IoT data analytics and platforms
Role of R in data analysis
Web forensic computing
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
Important Dates
Submission of manuscripts: 15 August, 2016
Notification to authors: 15 October, 2016
Final versions due: 15 November, 2016
Other CFPs
- Invitation for paper submission in special session "in Third International Conference on Computer & Communication Technologies (IC3T - 2016)" indexed by Springer
- International Conference ICT for Language Learning 9th edition
- 45th Annual ACM SIGPLAN Symposium on Principles of Programming Languages
- 19th ACM International Conference on Multimodal Interaction
- 19th International ACM SIGACCESS Conference on Computers and Accessibility
Last modified: 2016-04-27 13:34:46